Case Study: Is There Really Any SIP in the Internet?
Voice over IP (VoIP) and unified communications (UC) have many security issues—some unique and others shared with other network applications. Some security issues can be exploited from public networks, whereas others can only be exploited if the attacker has internal access. When we wrote the first version of this book, the majority of issues required internal access. UC is now more commonly used across the public network, and this network has become much more hostile. Part I of this book introduces the most significant UC threats and attacks, and then covers the processes of footprinting, scanning, and enumeration, which are used to gather information necessary ...
With Safari, you learn the way you learn best. Get unlimited access to videos, live online training,
learning paths, books, interactive tutorials, and more.